Incident Response


New York City Real Estate Firm Using EasyLobby Secure Visitation Management Software

Trinity Real Estate, a firm based in New York City, is using HID Global's EasyLobby Secure Visitor Management software to streamline how tenants can control visitor access at their firm's commercial real estate properties in Lower Manhattan.

Patriot Bank Installs Diebold Fire, Security Technology

Patriot Bank of Tulsa, Okla., has added new Diebold fire and security systems in an effort to protect their customers and employees.

Johnson Controls Expands Fire and Burglary Monitoring Services

Johnson Controls, a Milwaukee-based alarm-monitoring facility, is now using IP-based alarm transmissions instead of analog to monitor fire and burglary panels.

Preserving Musical Heritage

As the crown jewel of the rich artistic and cultural heritage of Rome, the Academy of Santa Cecilia is one of the oldest and most important musical institutions in the world. Its position and fame have steadily grown since it was founded in 1585. Today, it is internationally renowned, both as a venue for symphony orchestra concerts and as the custodian of a heritage of inestimable value, which makes it a landmark for academics and music lovers alike.

Security On The Fly

How significant is the mobile application market around the world today? You just need to look at some of the numbers to understand how widespread mobile apps have become, even in the physical security market, and how adoption of mobile phones, tablets and other smart devices that are used with these apps has gone from leading-edge to commonplace.

Taking Off

Today’s progressively faster pace of life rationalizes the thirst for near-constant connectivity.

Smart Thermal Cameras

Achieving security awareness around perimeters and outdoor areas comes down to timely, credible and detailed alerts.

Into the Future - Endless possibilities take New Jersey hospital forward

Into The Future

Since 1925, northern New Jersey has turned to Holy Name Medical Center in Teaneck for healthcare excellence.



Decision 2012 IP Video For All

The adoption of IP-based surveillance continues to increase annually, capturing market share across virtually all industry segments.

In The Cards

With thousands of guests daily visiting Casino Copenhagen, money is always changing hands.

Tap Into Security Remotely

Organizations whose operations span cities, countries and even continents face formidable challenges in their efforts to secure people, property and assets.

Adapting to Change

Adapting to Change

Perhaps the most common challenge and opportunity facing any industry in today’s world is creating solutions that can accommodate the transitions that come with the rapid advancement of technology.

Automated Alarm Protocol Stands Up to Real-world Tests

Automated Alarm Protocol Stands Up to Real-world Tests

New program enables police to nab robbers in record time.

A System of Support

A System of Support

In today’s ever-evolving security landscape, the “next best thing” often eclipses the importance of the fundamentals. Even as new interactive services and home control systems are introduced, at its core home security in particular relies on dependable systems, fast response and, as always, good customer service.

The Most-effective Strategy to Encourage More Working Smoke Alarms in Homes

The most-effective strategy to encourage more people to have a working smoke alarm in their homes has been revealed by a team of healthcare researchers.

Some Smartphone Models More Vulnerable to Attack

New research from North Carolina State University shows that some smartphones specifically designed to support the Android mobile platform have incorporated additional features that can be used by hackers to bypass Android’s security features, making them more vulnerable to attack. Android has the largest share of the smartphone market in the U.S.

Monitronics Named a Top Place to Work

The Dallas Morning News has named Monitronics, one of the nation's largest, fastest-growing alarm monitoring companies, one of the 2011 Top 100 Places to Work in Dallas-Fort Worth.

Evading Surveillance on Reality TV

In a world driven by technological advancements that include mobile monitoring and 24/7 surveillance, the idea of disconnecting from Big Brother seems relatively impossible.

The Logistics of Security

The Logistics of Security

Navarre Corp., a distribution and retail support operation in Minneapolis, previously relied on an analog-based surveillance system as a way to increase security and aid in investigations, but the company found the system unreliable for capturing high-quality video when incidents occurred.

Trends in Video Surveillance

Trends in Video Surveillance

The transition from analog CCTV equipment to network video surveillance equipment continues to be the major overarching trend within the video surveillance industry.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.